Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,953,171 System and method for tokenization of data for privacy
The present invention describes a system and method for tokenization of data. The system includes a receiver configured to receive a request for tokenization....
US-9,953,170 Semiconductor memory device, semiconductor system and reading method
The invention provides a flash memory which may effectively protect information with a high security level. A flash memory includes a setting part. When the...
US-9,953,169 Modify execution of application under test so user is power user
Example embodiments disclosed herein relate to modifying execution of an application under test to act as if a user is a power user. The application under test...
US-9,953,168 Secure boot of virtualized computing instances
In an approach, a secure boot process includes two phases. In the first phase an on premises device generates a data encryption key (DEK) with which to encrypt...
US-9,953,167 Trusted platforms using minimal hardware resources
Systems and methods facilitating a framework that provides a core trusted computing base (TCB) of an electronic device with various security capabilities. The...
US-9,953,166 Method for securely booting target processor in target system using a secure root of trust to verify a returned...
A method for securely booting a target processor in a target system from a secure root of trust includes computing a message authentication code from boot code...
US-9,953,165 Mobile platform software update with secure authentication
Generally, this disclosure describes devices, methods and systems and for securely updating software on a mobile platform using trusted hardware based...
US-9,953,164 Confirming a malware infection on a client device using a remote access connection tool, to identify a...
A device may receive a trigger to determine whether one or more client devices, of a set of client devices, are infected by a malicious file. The device may...
US-9,953,163 System and method for detection of malicious hypertext transfer protocol chains
A system configured to detect malware is described. The system configured to detect malware including a data collector configured to detect at least a first...
US-9,953,162 Rapid malware inspection of mobile applications
Disclosed are various embodiments for inspecting malware with little or no user interruption. A first computing device may compare a source code of an...
US-9,953,161 Method, device and system for processing notification bar message
Disclosed are a method, device and system for processing notification bar message, the method comprising: triggering an interception program pre-injected in a...
US-9,953,160 Applying multi-level clustering at scale to unlabeled data for anomaly detection and security
Methods, systems, and computer program products for applying multi-level clustering at scale to unlabeled data for anomaly detection and security are disclosed....
US-9,953,159 Software self-checking systems and methods
Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect...
US-9,953,158 Systems and methods for enforcing secure software execution
The disclosed computer-implemented method for enforcing secure software execution may include (1) providing at least one known benign input to an executable...
US-9,953,157 Method and apparatus for protecting application program
An application creating apparatus generates first authentication information using an authentication element is provided. The apparatus includes an application...
US-9,953,156 In-band peripheral authentication
This document describes techniques (300, 400) and apparatuses (100, 500, 600, 700) for in-band peripheral authentication. These techniques (300, 400) and...
US-9,953,155 System and method for coordinating asset entitlements
There is presented a system and method for coordinating asset entitlements, the system comprising a server including a processor and a memory and accessible by...
US-9,953,154 Lockable widgets on a mobile device
A software widget running on a user device may be designed to operate in a locked or an unlocked mode. In unlocked mode, the user has full interactivity with...
US-9,953,153 Sharing content online
A method of providing a degree of authentication for a content link presented to peer user(s) by a sharing user via the Internet. The method includes, at a...
US-9,953,152 Embedded authentication systems in an electronic device
This invention is directed to an electronic device with an embedded authentication system for restricting access to device resources. The authentication system...
US-9,953,151 System and method identifying a user to an associated device
The present system and method enables the automatic detection and identification of authorized users within proximity of a computing apparatus and, after...
US-9,953,150 Processing method and system for identity authentication with mobile terminal based on iris recognition
A processing method and system for identity authentication with a mobile terminal based on iris recognition is provided. The iris characteristic data of the...
US-9,953,149 Facial recognition authentication system including path parameters
Systems and methods for enrolling and authenticating a user in an authentication system via a user's camera of camera equipped mobile device include capturing...
US-9,953,148 System and method for unlocking devices associated with a carrying bag
A system and method for unlocking devices associated with a carrying bag are provided. In example embodiments, biometric information of a user from a biometric...
US-9,953,147 Computer-implemented system and method for correlating activity within a user interface with special information
A computer-implemented system and method for correlating activity within a user interface with special information is provided. A user interface with data entry...
US-9,953,146 Mobile communications device providing heuristic security authentication features and related methods
A mobile communications device includes a plurality of first input devices capable of passively collecting input data, a second input device(s) capable of...
US-9,953,145 Configuration method, configuration device, computer program product and control system
According to an aspect of the invention a configuration method for configuring a host device in a control system is conceived, in particular a building control...
US-9,953,144 Constellation based device binding
A method of binding a software to a device is disclosed. Accordingly, during a setup of the software in the device, a unique identifier is derived from contents...
US-9,953,143 Software identifier based correlation
Systems, methods, and other embodiments associated with software identifier based correlation are described. One example system includes an identifier data...
US-9,953,142 Digital rights management and behavioral traits
Digital rights management and behavioral trait techniques are described. In one or more implementations, a method is described of specifying and controlling...
US-9,953,141 Laboratory central control unit method and system
The present disclosure provides a method for coordinating data between a plurality of sample processing systems comprising: providing, using a central control...
US-9,953,140 Systems, methods, and apparatuses for securely dispensing one or more prescribed substances to a securely...
Systems, methods, and apparatuses for securely dispensing one or more prescribed substances at a given time and/or date are disclosed herein. In certain...
US-9,953,139 Endobiogenic-based processing of biological data
A method is provided that includes processing biological data using a biological simulation model, including calculating a set of measurements called indexes...
US-9,953,138 Drug component admixture library for a drug infusion delivery system
Minimizing improper dosage of a drug admixture (including a single primary drug component and at least one second drug component). For each drug component in...
US-9,953,137 Healthcare analysis stream management
Apparatus, systems and methods for pre-processing, analyzing, and storing genomic data through a scalable, distributed analysis system across a network is...
US-9,953,136 System for displaying and editing data for a medical device
A system for displaying and editing data for a medical device is provided. The system includes at least one viewing application for execution on a user...
US-9,953,135 Bioinformatics systems, apparatuses, and methods executed on an integrated circuit processing platform
A system, method and apparatus for executing a sequence analysis pipeline on genetic sequence data includes a structured ASIC formed of a set of hardwired...
US-9,953,134 Bioinformatics systems, apparatuses, and methods executed on an integrated circuit processing platform
A system, method and apparatus for executing a sequence analysis pipeline on genetic sequence data includes a structured ASIC formed of a set of hardwired...
US-9,953,133 Biological data annotation and visualization
Identification of regions-of-interest within cell maps is disclosed. In certain embodiments, identification of the regions-of interest is based on the use of a...
US-9,953,131 Multi-targeting short interfering RNAs
The present invention relates to novel short interfering RNA (siRNA) molecules that are multi-targeted. More specifically, the present invention relates to...
US-9,953,130 Systems and methods for detecting structural variants
Systems and method for identifying long deletions can obtain sequencing information for a plurality of amplicons in and around a potential region from a nucleic...
US-9,953,129 Patient stratification and determining clinical outcome for cancer patients
In a first aspect the present invention is directed to a method of generating a scheme allowing classification of a cancer of an individual patient for...
US-9,953,128 Identification apparatus, control apparatus, identification method, program, and identification system
Disclosed is an identification apparatus including an acquisition unit configured to acquire power generation information from a power generation unit; and an...
US-9,953,127 Fast freeform source and mask co-optimization method
The present disclosure relates to lithographic apparatuses and processes, and more particularly to tools for optimizing illumination sources and masks for use...
US-9,953,126 Method of wiring layout, semiconductor device, program for supporting design of wiring layout, and method for...
According to one embodiment, a design method of layout formed by a sidewall method is provided. The method includes: preparing a base pattern on which a...
US-9,953,125 Design/technology co-optimization platform for high-mobility channels CMOS technology
Embodiments of the present invention may provide the capability to design SRAM cells may be designed that is compatible with the requirements of InGaAs...
US-9,953,124 Generating a layout for an integrated circuit
In an approach for generating a file, a computer generates a modified layout for an integrated circuit. The computer receives a draft layout for an integrated...
US-9,953,123 Aware variable fill pattern generator
A layout file for an integrated circuit has drawn geometries. Variable fill geometries are added to local areas based on densities of the drawn geometries in...
US-9,953,122 Integrated circuit design method and associated non-transitory computer-readable medium
An integrated circuit (IC) design method is disclosed. The method includes: using a computer to perform synthesis upon a register transfer level (RTL) IC design...
US-9,953,121 Accommodating engineering change orders in integrated circuit design
A computer-implemented method includes identifying an in initial register-transfer-level description for an integrated circuit design and adding one or more...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.